Qualitative research methods for the social sciences, 1989. ,
http://softwareintegrity.coverity.com/coverity-scan-2011-open-source- integrity-report-registration.html [6] Dell to Acquire Secureworks-ir-shld-release [7] Department of Energy Launches Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats , http://energy.gov/articles/department-energy-launches-initiative- industry-better-protect-nation-s-electric-grid-cyber, Open Source Integrity Report, 2011. ,
Free/Libre and Open Source Software: Survey and Study, Part 4: Survey of Developers, 2002. ,
Cyber Attack Exposure Evaluation Framework for the Smart Grid, IEEE Transactions on Smart Grid, vol.2, issue.4, pp.835-843, 2011. ,
DOI : 10.1109/TSG.2011.2163829
Cave or Community? An Empirical Examination of 100 Mature Open Source Projects, First Monday, vol.7, issue.6, 2002. ,
DOI : 10.5210/fm.v7i6.960
The Boston Consulting Group Hacker Survey, 2002. ,
Research lab extends host-based cyber sensor project to open source041612-hone- 258296.html [18] Open Source Census Tracks Enterprise Use of Open Source Globally19] Ransbotham, S.: An Empirical Analysis of Exploitation Attempts based on Vulnerabilities in Open Source Software, Workshop on the Economics of Information Security, 2008. ,
Who Is Doing It? A research on Libre Software developers, 2001. ,
Secure Information Exchange Gateway for Electric Grid Operations , http://www.iti.illinois.edu/research/power-grid/siegate-secure- information-exchange-gateway-electric-grid-operations ,
http://energy.gov/sites/prod/files, Smart Grid Investment Grant Program: Progress Report (2012) ,
Open Source Software (OSS) in the Department of Defense (DoD), 2003. ,
Cyber Incidents Involving Control Systems ,
The Growth of Open Source Software in Organization, pdf [30] Wennergren, D.M.: Clarifying Guidance Regarding Open Source Software (OSS), 2005. ,
Why Open Source Software/Free Software, Look at the Numbers!, 2007. ,
Toward an understanding of the motivation of open source software developers, Proc. of the 25th International Conf. on Software Engineering, pp.419-429, 2003. ,